top of page
Asset 5.png
Frame 1044.png
Frame 1034.png
Frame 1030.png
cisco-meraki.png
Frame 1031.png
Frame 1029.png
Frame 1025.png

Cisco Meraki

Product Design Intern | Fall 2023

During the fall of my senior year, I had the pleasure of working on Cisco Meraki's MX Security team to redesign an impactful product called "Security Center 2.0". I spearheaded the research process to provide a foundation and gain insight into developing a new experience responding quickly and effectively to internal and external security incidents at Cisco Meraki. After conducting user research, collaborating with cross-functional teams, and numerous design variations, I developed both low-fidelity and high-fidelity prototypes for the "Security Center 2.0" user experience.

Research

What is Security Center 2.0?

A central place where admins can view and respond to security events in their organization

Security-amico 1.png
versus (1) 1.png
Hacker-bro 2.png

To combat advanced threats, we are improving the Security Center to leverage Cisco Meraki networking and Cisco Security.

Research

Race to success 🥇

User Goals & Objectives

Persona One-liner.png
Web devices-rafiki 1.png

Respond quickly and effectively to internal and external security incidents.

Report-bro 1.png

Access and view the same information across all security admins to strategize against threats.

Fast loading-bro 1.png

Allow users to view specific security threats on the org level in one place.

background.png
Research
problem.png
Research

End-to-End User Centered Process

Double Diamond Design

diamond.png
Meraki Logo.png
Methodology of Competitive Analysis

Keep your friends close 📝

image 5.png
PANW_Parent_Brand_Primary_Logo_RGB 1.png
Screenshot 2023-12-06 at 12.27 1.png
image 4.png

01. Research Questions

Explore research questions to narrow the scope of research.

02. Goal

Find strengths and weaknesses of products outside of Meraki.

03. Analyze

Analyze each competitor product by listing best, unique, same, and poor usability features.

Summarize key findings to generate recommendations for Security Center 2.0.

Outcomes of Competitive Analysis

Learn from those around you 🧬

Group 621.png

Best

Usability best practices include:

  • Accessible information

  • Visuals supporting data

  • Standardized searching and filtering

Unique

Many of our competitors integrate customizable features for their tables and dashboards.

Poor

  • Lack of accessible information

  • Lack of clarity in tasks and buttons

  • Unclear data visualizations

After multiple rounds of reviews from Magnetic and Cross Functional teams...

Design is not a linear process! 📈

Group 622.png
Previous Design

Modernizing Security Center Events 🛠️

Group 623.png
Respond quickly and effectively to internal and external security incidents.

User Goal: Reducing Mean Time to Resolution ⏰

Group 624.png
Allow users to view specific security threats on the org level in one place.

User Goal: Simplifying Complex Workflows 🦾️

Group 625.png
Access and view the same information across all security admins to strategize against threats.

User Goal: Gain Insight and Strategize 👓

Group 626.png
Refinement
Methodology for Concept Testing

Testing testing... 📝️

Research paper-amico 1.png

01. What?

Internal interviews and concept validation for phase one design

02. Who?

4 MX Ninjas - Sales & TSAs

03. Why?

To validate design concepts and catch any usability problems that appear in the new design

Key Takeaways from Concept Testing

Navigation

Two participants found the side drawer difficult to navigate to for quick drill-down.

Group 626.png
Group 627.png
Key Takeaways from Concept Testing

Filters

Three participants wanted to be able to save row filters.

Group 624.png
Key Takeaways from Concept Testing

Priorities

4 participants viewed the threat and the impact of the threat as the most important detail to see.

Group 625.png
Group 628.png
01
Filters : Filter Pills

Quickly select and edit table filters to get results faster

Screenshot 2024-02-27 at 8.05.44 PM.png
02
Filters : Tooltips

Access filter information to understand threats in the table

Screenshot 2024-02-27 at 8.07.43 PM.png
03
Navigation & Priorities : Information Drawer

Highlighted rows indicating a user interaction to prompt an information drawer

Information and interactions inside the drawer have been reorganized from user testing results

Screenshot 2024-02-27 at 8.06.22 PM.png
04
Filters & Priorities : Saving Filters

Row filters are now savable with this modal and can be accessed from the search bar

Screenshot 2024-02-27 at 8.05.53 PM.png
05
Priorities : Customizable Columns

From user testing, columns are now customizable for Security Admins to view specific information needed to trouble shoot threats

Screenshot 2024-02-27 at 8.06.42 PM.png
Next Steps for Security Center 2.0

Things to look forward to 🪜️

1

Research

Customer Testing

External interviews and design validation from Meraki customers

2

Design

Reiterate

​Gather key insights and discuss design iterations to prepare for handoff

3

Deliver

Document

​Document all the project points and resources into one place to prepare for handoff

Impact
What I learned at Cisco Meraki
Communication with cross functional teams like Engineers, PMs, and TMEs.
01
Balancing team needs and project requirements
02
Taking the lead and navigating timelines
03
Frame 1032.png

Check out my other work!

Genemod
Genemod
Visio
Visio
geico.png
GEICO
bottom of page